Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

System and method for detecting and defending computer worm

A malicious program and computer technology, applied in the field of systems that can detect and defend unknown malicious programs, and can solve problems such as differences, large system resources, and inability to do so.

Active Publication Date: 2008-03-12
ZHUHAI KINGSOFT SOFTWARE CO LTD
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

One is that it occupies a huge amount of system resources, and it is impossible to detect in real time when the program is running, and it can only be detected manually
The second is the difference between the virtual machine environment and the real machine

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for detecting and defending computer worm
  • System and method for detecting and defending computer worm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] As shown in Figure 1, in a common computer system, a system 1, a target program 2, a computer operating system 3, a network connection module 4, and a file system 5 that can be executed by the computer for detecting and defending computer malicious programs are installed , Registry database 6; Also have common CPU, internal storage device and external storage device (not shown in the figure) in this computer. The target program 2 may exist in files in internal and external storage devices of the computer, as well as files or data packages downloaded and transmitted from the network. The target program 2 can run in the computer operating system 3, and can call related functions to operate the network connection module, file system, registry database and other software and hardware. The system 1 for detecting and defending against malicious computer programs can effectively monitor the process of calling related functions by the target program.

[0031] The system 1 for ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This invention relates to test and protective computer ill-purpose program system, which comprises the following parts: computer operation system monitor device to collect aim programs operation information; aim program operation record device to store aim programs operation records and to record repaired files, register form; known action characteristics memory device to store known, processed operation information and to store each operation relative danger degree weigh; aim program action identification analysis device to compare the aim program with known action; ill-purpose action removal device to remove the ill-purpose program.

Description

technical field [0001] The invention relates to a technology for detecting and defending computer viruses, Trojan horse programs and other malicious damage programs, especially a system and method capable of detecting and defending unknown malicious programs. Background technique [0002] For a long time, computer programs (hereinafter collectively referred to as malicious programs) have destructive execution results (destroy the system, tamper with files, affect system stability and execution efficiency, steal information, etc.), mainly computer viruses, logic bombs, Trojan horse programs, and spy programs. ) have always been a major problem in the use of computers, and they pose a major threat to information security. There are many types of these malicious programs, and they spread in various ways, making it hard to detect. For example, many malicious programs use the loopholes of the operating system to spread through the network or through the executable files in the in...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F1/00
Inventor 陈睿孟槟榔韩祝鹏陈飞舟孙国军
Owner ZHUHAI KINGSOFT SOFTWARE CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products